VT 2007, Period 3, 2G1330 Wireless and Mobile Network Architectures (Arkitekturer för trådlösa och mobila nätverk)
Last modified: 2007-03-21
Grades for all students who submitted their reports on time and have given their oral presentation have been entered in LADOK. As time permits the late reports will be read, commented upon, and graded.
The presentations on the 13th of March will take place in Aula - as scheduled. However, due to the number of students in the course, I've scheduled some extra times for presentations, these will take place at the seminar room Grimeton at Wireless@KTH (Isafjordsgatan 30B).
- Students who have a scheduling conflict with the dates and times of the lectures should contact the instructor - since I know there are at least 5 such students alternate arrangements are available for these students.
- For your document, you should be sure to use A4 sized paper rather than US letter.
- For those using LaTeX, you can improve the look of the document by:
- switching to using PostScipt fonts (instructions)
- You can also turn off hyphenation or at least limit its use with "\hyphenpenalty=5000 \tolerance=1000"
2G1330 Wireless and Mobile Network Architectures is a 5 point course designed for advanced undergraduates and graduate students; especially those in the Telecommunication Graduate Program or the International Masters Wireless program.
Advanced undergraduates should have completed the course 2G1305 (Internetworking) or 2G1701 (Advanced Internetworking) or an equivalent course. Students without one of these courses should obtain permission of the 2G1330 instructor.
Information is available on:
- Literature and Course Material (Textbook, Reference books and other references)
- Lecture Plan and Lecture Material (OH slides)
- Examination Requirements and Registrations
- Staff Associated with the Course
- Registering for the Course
- Other on-line Course Material (More References)
- Previous versions of the course
This course will give both practical and general knowledge concerning wireless and mobile network architectures. After this course you should have some knowledge of these architectures and understand the basic priciples behind them.
Following this course a student should be able to:
- Understand the architecture of existing mobile and wireless networks at a sufficient level to recognize the common features of such networks in any mobile or wireless network.
- Based upon recognition of common features, the student should be able to compare and contrast one network architecture with another.
- Describe differences between different types of mobility (such as user mobile, terminal mobility, session mobility) and understand how each type of mobility can be supported.
- Understand the core network protocols and applications in third generation mobile networks.
- Read the current literature at the level of conference papers in this area.
- While you may not be able to understand all of the papers in journals, magazines, and conferences in this area - you should be able to read 90% or more of them and have good comprehension. In this area it is especially important that develop a habit of reading the journals, trade papers, etc. In addition, you should also be aware of both standardization activities, new products/services, and public policy in the area.
- Demonstrate knowledge of this area both orally and in writing.
- By writing a paper suitable for submission to conferences and journals in the area.
This course should prepare you for starting an exjobb in this area (for undergraduate students) or beginning a thesis or dissertation (for graduate students).
- Telesys, gk or Datorkommunikation och datornät/Data and Computer Communications or equivalent knowledge in Computer Communications; Internetworking; and permission of the instructor
Students considering participating in this course should contact the instructor.
This course will focus on the network architectures that are used in wireless and mobile networks. In some cases we will dig deeper into the protocols used by such networks. The course should give both practical and more general knowledge concerning the these network architectures.
The course consists of 10 hours of lectures, and an assigned paper requiring roughly 50h of work by each student.
- An assigned paper requiring roughly 50h of work by each student (5 p)
- Registration: Friday 02-Feb-07, to email@example.com with the "Subject: 2G1330 topics" giving:
- Group members, leader.
- Topic selected
- Written report
- The length of the final report should be ~10 pages (roughly 5,000 words) for each student; it should not be longer than 12 pages for each student - papers which are longer than 12 pages per student will be graded as "U".
- The paper style should be that of a conference paper.
- Papers should not focus on physical and link layer issues as this is not a course in radio communication systems, but rather the papers should look at things which have an impact on the architecture or upon which the architecture has an effect.
- If there are multiple students in a project group, the report may be in the form of a collections of papers, with each paper suitable for submission to a conference or journal.
- Contribution by each member of the group - must be clear (in the case where the report is a collection of papers - the role of each member of the group can be explain in the overall introduction to the papers.
- The report should clearly describe: 1) what you have done; 2) who did what; if you have done some implementation and measurements you should describe the methods and tools used, along with the test or implementation results, and your analysis.
- Final Report: written report due Monday 26-Feb-07 at 23:59 + oral presentations scheduled Tuesday 13-Mar-07 08:00-18:00 in Aula
- Send email with URL link to firstname.lastname@example.org
- Late assignments will not be accepted. Papers which are submitted after the deadline will be graded, but the grading might not be completed before the end of the term.
- Note that it is pemissible to start working well in advance of the deadlines!
- Language: the report can be written in Swedish or English (NB: I can provide better feedback if the report is written in English.)
- Oral presentations: Each group should present their results for at most 20 minutes (note that this is the upper limit on time - not a lower limit, thus an individial doing a project might plan on 8-10 minutes), followed by some discussion. You only need to attend the half-day you present. The exact schedule into half-days will be made once I have received the written reports.
Grades: U, 3, 4, 5
To get a 4 you need to write a very good paper, i.e., it should be either a very good review or present a new idea; and you have to give a very good oral presentation.
To get a 5 you need to have an outstanding or excellent paper and give an outstanding oral presentation.
"komplettering" - students who do not pass can submit a revised version of their paper (or a completely new paper) - which will be evaluated.
Code of Honor and Regulations
KTH has a common code of honor and regulations (see Code of Honor and Regulations).
The textbook for 2007 will be: Yi-Bing Lin and Ai-Chun Pang, Wireless and Mobile All-IP Networks, John Wiley & Sons; 2005, ISBN: 0-471-74922-2. (some notes about the book)
The course was previously mainly based on the book Wireless and Mobile Network Architectures by Yi-Bing Lin and Imrich Chlamtac, John Wiley & Sons; 2001 ISBN: 0-471-39492-0 (a version published in Singapore is ISBN 9971-51-366-8).
Additional Reference Books
- Mobile IP: Design Principles and Practices by Charles E. Perkins, Addison-Wesley, 1998, ISBN 0-201-63469-4.
- Mobile IP: the Internet Unplugged by James D. Solomon, Prentice Hall, 1998, ISBN 0-13-856246-6.
- Pervasive Computing: Technology and Architecture of Mobile Internet Applications by Jochen Burkhardt, Dr. Horst Henn, Stefan Hepper, Klaus Rintdoff, and Thomas Schäck, Addison-Wesley, 2002, ISBN 0-201-72215-1. This is a book about writing Java server applications for PDA, WAP devices, PCs, ... .
- Wireless Internet Applications and Architecture: Building Professional Wireless Applications Worldwide by Mark Beaulieu, Addison-Wesley, 2002, ISBN 0-201-73354-4. This book gives provides some good descriptions of why mobile applications are not like desktop applications.
- William C.Y. Lee, Mobile Cellular Telecommunications: Analog and Digital Systems, Second Edition, 1995, ISBN 0-07-038089-9; all the usual radio topics
- Ellen Kayata Wesel, Wireless Multimedia Communications: Networking Video, Voice, and Data, Addison-Wesley, 1998, ISBN 0-201-63394-9. (This book is really about signal processing and means to over come problems. Written by someone who works with satellite systems.)
- David J. Goodman, Wireless Personal Communication Systems, Addison-Wesley, 1997, ISBN 0-201-63470-8. Greate coverage about the link layer details and general architectures of AMPS, IS-41, North American TDMA and CDMA, and GSM. Only very brief coverage of CT2, DECT, PHS, and PACS. This is an exteremely well written book.
- Theodore S. Rappaport, Wireless Communications: Principles and Practice, 2nd edition, Prentice-Hall, 2002, 736 pp., ISBN: 0-13-042232-0.
- H. Peter Alesso and Craig F. Smith, The Intelligent Wireless Web, Addison-Wesley, 2002, ISBN 0-201-73063-4.
- K. Pahlavan and P. Krishnamurthy, Principles of Wireless Networks, Prentice Hall PTR, 2002, ISBN 0-13-093003-2.
- Håkan Lindberg, Trålösa nätverl - WLAN, WEP och WiFi, Studentlitterature, Lund, 2002, ISBN-91-44-02696-X
- Harold Davis and Richard Mansfield, The Wi-Fi Experience: Everyone's Guide to 802.11b Wireless Networking, Que, Book and CD-ROM edition (December 21, 2001), 176 pages, ISBN: 0789726629
- Matthew S. Gast, 802.11 Wireless Networks: The Definitive Guide, O'Reilly & Associates, 1st edition (April 2002), 464 pages, ISBN: 0596001835
- Jim Geier, Wireless LANS - Implementing High Performance IEEE 802.11 Networks, Sams, 2nd edition (July 9, 2001), 360 pages, ISBN: 0672320584
- Lawrence Harte (Editor), Nancy Campbell, R. Dreher, Richard Dreher (Illustrator), Steve Kellogg (Editor), Steven Kellogg, Tom Schaffnit, Lisa Gosselin, Judith Rourke-O'Briant, The Comprehensive Guide to Wireless Technology, APDG Publishing; 1st edition (January 1, 2000), 278 pages, ISBN: 0965065847
- James LaRocca, Ruth Larocca, and Judy Bass, 802.11 Demystified: Wi-Fi Made Easy, McGraw-Hill Professional, 1st edition (June 10, 2002), 291 pages, ISBN: 0071385282
- Daniel Minoli, Hotspot Networks: WiFi for Public Access Locations, McGraw-Hill Professional, (September 4, 2002), 435 pages, ISBN: 0071409785
- Bob O'Hara and Al Petrick, The IEEE 802.11 Handbook: A Designer's Companion, IEEE, 1 edition (December 1999), ISBN: 0738118559
- E. Ouellet, R. Padjen, A. Pfund, R. Fuller (Ed.), and T. Blakenship (Ed.), Building a CISCO Wireless LAN, Syngress Media Inc., 1st edition (June 15, 2002), 520 pages, ISBN: 192899458X
- Ron Seide, Neil P. Reid, Lyssa Wald (Illustrator), and Dave Molta, Wi-Fi (802.11) Network Handbook, McGraw-Hill Osborne Media, (December 5, 2002), 363 pages, ISBN: 0072226234
- James Trulove (Editor), Build Your Own Wireless LAN (with Projects), McGraw-Hill Professional, 1st edition (May 29, 2002), 351 pages, ISBN: 0071380450 Also as an e-book.
- Jeffrey Wheat, Randy Hiser, Jackie Tucker, Alicia Neely, and Andy McCullough, Designing a Wireless Network, Syngress Media Inc., 1st edition (June 15, 2001), 379 pages, ISBN: 1928994458
- IETF BoF Control and Provisioning of Wireless Access Points (CAPWAP)
- WRAPIis a Microsoft Windows XP software library that allows applications to query/set information about an IEEE 802.11 network.
- Enrico Pelletta, Maximum Throughput of IEEE 802.11 Access Points: Test Procedure and Measurements, Masters Thesis, Department of Microelectronics and Information Technology, Royal Institute of Technology (KTH), 10th August 2004.
- WLAN security
- Christian Barnes, Tony Bautts, Donald Lloyd, Eric Ouellet, Jeffrey Posluns, David M. Zendzian, Neal O'Farrell (Editor), Erif Ouellet, Hack Proofing Your Wireless Network, Syngress Media Inc., 1st edition (February 28, 2002), 512 pages, ISBN: 1928994598
- Jahanzeb Khan and Anis Khwaja, Building Secure Wireless Networks with 802.11, John Wiley & Sons, 1 edition (January 10, 2003), 320 pages, ISBN: 0471237159
- Stewart S. Miller, Wi-Fi Security, McGraw-Hill Professional, (January 22, 2003), 309 pages, ISBN: 0071410732
- Randall K. Nichols and Panos C. Lekkas, Wireless Security: Models, Threats, and Solutions, McGraw-Hill Professional, 1st edition (December 13, 2001), 657 pages, ISBN: 0071380388
- Cyrus Peikari and Seth Fogie, Maximum Wireless Security, Sams, Book and CD-ROM edition (December 18, 2002), 408 pages, ISBN: 0672324881
- Bruce Potter and Bob Fleck (Editor), 802.11 Security, O'Reilly & Associates, 1st Edition edition (December 2002), 208 pages, ISBN: 0596002904
- Russell Dean Vines, Wireless Security Essentials: Defending Mobile Systems from Data Piracy, John Wiley & Sons, 1st edition (July 15, 2002), 320 pages, ISBN: 0471209368
- Bernard Aboba's "Unofficial 802.11 Security Web Page"
- Community WLANs
- Rob Flickenger, Building Wireless Community Networks, O'Reilly & Associates, 1st edition (December 15, 2001), 150 pages, ISBN: 0596002041
- Jennifer Bray and Charles F. Sturman, Bluetooth, Prentice Hall PTR; 1st edition (December 15, 2000), ASIN: 0130898406
- Brent A. Miller and Chatschik Bisdikian, Bluetooth Revealed: The Insider's Guide to an Open Specification for Global Wireless Communications, Prentice Hall PTR; (September 25, 2000), ISBN: 0130902942
- According to the IEEE standards web site a PDF and CD version of 802.16e has been released but the price is rather high. (The stardard was ratified in Dec. 2005).
- History of the drafts
- Individual access to the underlying 802.16 standard
- some articles about 802.16e (a), (b), (c), (d), (e)
- Look at some of the companies active in the area starting with:
- IETF and IAB activities regarding 802.16e include: (a), (b), (c), (d), (e), (f)
- low-power wireless sensor networks
- John Meurling and Richard Jeans, "The Mobile Phone Book: The invention of the mobile telephone industry, Published by CommunicationsWeek International on behalf of Ericsson Radio Systems, 1994, ISBN 0-9524031-0-2
- SIM related
- "linear 4G vision" vs. "concurrent 4G vision" is described in Erik Bohlin, Sven Lindmark, Joakim Björkdahl, Arnd Weber, Bernd Wingert, and Pieter Ballon, The Future of Mobile Communications in the EU: Assessing the Potential of 4G, Carlos Rodriguez Casal, Jean-Claude Burgelman, Gérard Carat (IPTS editors). Foresight on Information Technologies in Europe (FISTE), The Institute for Prospective Technological Studies (IPTS) EUR No: EUR 21192 EN, Year: 2004, ISBN: 92-894-7872-1
Lecture notes will be available on-line in PDF format.
- Joseph Mitola III, "Software Radio Architecture: Object-Oriented Approaches to Wireless Systems Engineering", John Wiley & Sons, October 20, 2000, 568 pages, ISBN: 0-471-38492-5
- Joseph Mitola and Zoran Zvonar (eds.) "Software Radio Technologies: Selected Readings", IEEE, 1st edition, 2001, 544 pages ISBN: 0780360222.
- Markus Dillinger, Kambiz Madani, and Nancy Alonistioti (eds.), "Software Defined Radio: Architectures, Systems and Functions", Wiley, 2003, ISBN 0-470-85164-3.
- Richard Blum, Network Performance Open Source Toolkit: Using Netperf, tcptrace, NIST Net, and SSFNet, Wiley Publishing, 2003, ISBN: 0-471-43301-2
To be added
- Wireless in Everything
- Near Field Radio for touch interfaces
- Bluetooth in 5 x 4 x 1.1mm module
- Xilinx's Bluetooth tutorials
- IETF: Internet RFCs, Internet drafts, ...
- Sierra Wireless, GSM/GPRS SDK AT Command Reference, Rev 1.0, 2130213, 2002; gives a nice introduction to Hayes ATtention commands, with sections on GSM, SMS, GPRS
- Sony Ericsson, GPRS PC Card Modem GC75 AT-Commands Manual, Draft P1C, date unknown.
- 4G at GaTech
- Defense Advanced Research Projects Agency (DARPA) NeXt Generation (XG) Communications program
- New America Foundation, "Wave of the Future or Dead in the Water? The Public Release of DARPA's XG Spectrum Sharing Technology", June 20, 2003, Washington, DC
- Shared Spectrum Company
- Dr. David Wake, A Survey of Current and Emerging Radio-Over-Fibre Technologies for Wireless Communications Applications", Application Note, Microwave Photonics, Los Angeles, CA, "extended and updated version of the invited paper given at the International Topical Meeting on Microwave Photonics, 2002 (MWP2002)".
- Alcatel Telecommunications Review (ATR)
- Ericsson's Telecom Report
- Ollie Whitehouse, "War Nibbling: Bluetooth Insecurity", @stake, Inc., October 2003
- Marcel Holtmann and Andreas Vedral, Bluetooth programming for Linux, Wireless Technologies Congress 2003, Sindelfingen, Germany, 2003
- William Enck, Patrick Traynor, Patrick McDaniel, and Thomas La Porta, "Exploiting Open Functionality in SMS-Capable Cellular Networks", In Proceeding the 12th ACM Conference on Computer and Communications Security (CCS'05), November 7-11, 2005, Alexandria, VA, USA, preprint: September 2, 2005
Note that in the following "xx" means "xx:00", not "xx:15".
Dates for 2007:
|Thursday 18-Jan-07||10:00-12:00||Aula||Föreläsning 1|
|Thursday 18-Jan-07||14:00-18:00||Aula||Föreläsning 2|
|Friday 19-Jan-07||10:00-12:00||Sal E||Föreläsning 3|
|Friday 19-Jan-07||14:00-18:00||Aula||Föreläsning 4|
Note that Aula and Sal E are in the Forum building in Kista.
Lecture Plan and Lecture Material (OH slides)
Note that the lectures will occur in a very intensive fashion to accommodate graduate students coming from elsewhere in Sweden.
Additional material concerning RFID, appears with permission of the author.
Staff Associated with the Course
- Lecturer (kursansvarig, föreläsare): Prof. Gerald Q. Maguire Jr. (email@example.com)
- Teaching assistants: TBA
- Administrative Assistant -- for administrative questions: recording of grades, ... contact
Use the normal process for registering. For most students this means you should speak with your study advisor (studievägledare.
- Students who are not regularily enrolled can apply for the course by filling out an application form -- please bring this form with you to class - so that I can expedite its processing (since normally this application should be submitted in advance of the course.
Other on-line Course Material
An example of an outstanding paper on Intrusion Detection in Wireless Sensor Networks, it appears here with permission of the author.
An example of an outstanding paper on imode, it appears here with permission of the author.
An example of a paper examing the much lower layer issues of Handover Considerations in the Design of Multi-Standard Transceiver Front Ends, it appears here with permission of the author.
Another example paper: Wireless VPN: IPSec vs. SSL/TLS by Åsa Pehrson. It appears here with permission of the author.
An example of a paper examining multimedia messaging is that of Max Loubser, " User created content with MMS", it appears here with permission of the author.
An example of a paper and slides from the oral presentation (on 2006.03.14) concerning bypassing access control in semi-open wireless networks. The link to this paper appears with permission of the author.
The local MONACO GSM/GPRS system.
Sources for Further Information
Most GSM standards can be accessed from ETSI
Two papers about MANETs:
- Erik Nordström, Richard Gold and Per Gunningberg, "Mythbusters: Whatever You Thought About MANET Routing, Think Again. . .", Department of Information Technology, Uppsala University, Report 2005-039, 2005.
- S. Kurkowski, T. Camp, and M. Coagrosso, "MANET simulation studies: the Incredibles", ACM SIGMOBILE Mobile Computing and Communications Review, 9(4), October 2005.
Steve Gibson and Leo Laporte's podcasts about WiFi security
Mobilepipeline mobile related on-line news
For further information related to communications (especially conferences, publications, ...) contact one of the professional societies, such as the IEEE Communications Society, vendors, or use the WWW! [For access to the electronics library see KTHB e-library.]
Handsets poised to be commodities: "Microsoft, Intel Aim for High-End Phone", Wall Street Journal Europe, Tuesday, 19 Feb. 2002, page 1 and pg. A6, features an article, which describes how they are attempting to provide a platform for high-end phones so that they will be commodities just like PCs. The figure on A6 shows the basic components of a handset and lists the prices for the components and for licensing the design "framework":
|color screen||17 euro|
|printed circuit board||9 euro|
|flash memory||2 euro|
|radio chip and related electronics||40 euro|
|baseband chip||34 euro|
|license for reference design for phone 7.50 euro|
|license of user interface software 3.40 euro|
|license for operating system software 5.70 euro|
An footnote indicates that the last three items could be developed in house, but typically cost 15 euros from outside suppliers.
IEEE 802.15 Working group:
802.15.3 high performance requirements (upto 55Mbps)
802.15.4 low bandwidth (~250kbps), extra-low power MAC and physical devices
Working group IEEE P802.20, Mobile Broadband Wireless Access Systems
Qovia Inc. annouced software to block VoIP Spam in June 2004, as a module for their VoIP Monitoring and Management System.
For those looking at power measurements, as useful reference is Joe Bardwell, Converting Signal Strength Percentage to dBm Values, Executive Summary, WildPackets, November 2002.
For information about the structure of the SIM file system see chapter 8: Pocket PC Phone Edition, in Steve Makofsky, "Pocket PC Network Programming", Addison-Wesley, 2004, ISBN 0-321-13352-8.
Georg Eidenschink, Elatic, Smart Card solutions for everyone, Elatec Vertriebs GmbH - a very nice introduction to smart cards and there use as SIM and USIM cards
Cisco has just made the source code for a number of GSM signalling protocols publically available - see their GSM Source Module Library (GSML)
Previous versions of the course
|2007.01.23||added Claudia's RFID notes|
|2007.01.17||added lecture notes for 2007|
|2007.01.11||added some notes concerning the textbook for 2007|
|2006.12.02||added new textbook for 2007|
|2006.11.05||added course dates and rooms for 2007|
|2006.07.28||further changes for 2007|
|2006.06.13||first version for 2007|
© Copyright 2004, 2005, 2006, 2007 G.Q.Maguire Jr. (firstname.lastname@example.org)
All Rights Reserved.
Last modified: 2007-03-21